Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA Directory r8.1 0608 (build 942)
CCEVS-VR-0040-2007
MP C2003/C2503 (Ricoh/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) EEA-1.00
JISEC-CC-CRP-C0468
name CA Directory r8.1 0608 (build 942) MP C2003/C2503 (Ricoh/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec) EEA-1.00
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme US JP
not_valid_after 06.09.2012 03.03.2020
not_valid_before 30.04.2007 27.02.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0468_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0468_est.pdf
manufacturer CA Technologies Ricoh Company, Ltd.
manufacturer_web https://www.ca.com https://www.ricoh.com/
security_level EAL3 EAL2+, ALC_FLR.2
dgst 2be2ede185c90a0b ae4b55b59e6cf2b8
heuristics/cert_id CCEVS-VR-0040-2007 JISEC-CC-CRP-C0468
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:h:ricoh:mp_c2503:-:*:*:*:*:*:*:*, cpe:2.3:h:ricoh:mp_c2003:-:*:*:*:*:*:*:*
heuristics/extracted_sars ATE_IND.2, ADV_FSP.1, ALC_DVS.1, ATE_COV.2, AGD_USR.1, AVA_SOF.1, ATE_FUN.1, ADV_RCR.1, AGD_ADM.1, ADV_HLD.2, AVA_MSU.1, ATE_DPT.1, AVA_VLA.1 ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_DEL.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1
heuristics/extracted_versions 8.1 1.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0468
  • certification_date: 01.02.2015
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0468_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: MP C2003/C2503 (Ricoh/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec)
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0468_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0468_est.pdf
    • toe_version: EEA-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.03.2020
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0468_it4522.html
  • toe_overseas_name: MP C2003/C2503 (Ricoh/Lanier/nashuatec/Rex-Rotary/Gestetner/infotec)EEA-1.00
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/report_filename st_vid3022-vr.pdf c0468_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-07-0040
    • cert_item: CA Directory, r8.1 0608 (build 942) for the Sun Solaris Platform
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-06-3022: 23
    • CCEVS-VR-07-0040: 1
  • JP:
    • CRP-C0468-01: 1
    • Certification No. C0468: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 2
    • EAL3: 8
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.2: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 2
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 1
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAR.1: 1
    • FAU_SEL.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_ATD.1: 1
    • FIA_SOS.1: 2
    • FIA_UAU: 3
    • FIA_UAU.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MTD: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 23
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 18
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2004-0079: 1
    • CVE-2005-3653: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Only - Out of Scope DXconsole DUA/LDUA The system configuration consists of two Sun SPARC Solaris 9 machines. On one: 1
    • Out of Scope: 3
    • and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA Figure 3. TOE’s physical scope by product components used 16 CA: 1
    • before use. RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote Machine and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote: 1
    • iGateway affects the DXmanager module of eTrust Directory 8.1. DXmanager is not installed and out of scope for the evaluation. Also applies to the HTTP interface which is not an interface to the TOE. •: 1
    • in scope) and the SSLD (out of scope) though not depicted: 1
    • of the evaluation. Therefore, the cryptographic algorithms performed within the SSLD component are out of scope and not verified by this evaluation. Aspects of the following security functions are controlled : 1
    • out of scope: 3
    • used for the Developers Testing. The TOE DSA box includes the Ingres db (in scope) and the SSLD (out of scope) though not depicted. RPC DSA RPB DSA RPA DSA TOE DSA DUA/LDUA TOE machine Remote Machine For Test: 1
pdf_data/report_metadata
  • /Author: wshanahan
  • /CreationDate: D:20070717085537-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070717085839-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070717125458
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 184938
  • pdf_hyperlinks: http://www.cygnacom.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /CreationDate: D:20150324104113+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150324104244+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 337914
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
pdf_data/st_filename st_vid3022-st.pdf c0468_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 10
  • EAL:
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 3
    • AVA_VLA.1: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 17
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 7
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 16
    • FIA_SOS.1.1: 1
    • FIA_UAU: 25
    • FIA_UAU.1: 17
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 34
    • FMT_MSA.1: 2
    • FMT_MSA.3: 2
    • FMT_MTD: 45
    • FMT_MTD.1: 2
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM: 1
    • FPT_RVM.1: 5
    • FPT_RVM_EXP: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 5
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 3
    • FTP_ITC_EXP.1: 2
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 31
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 39
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 8
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.DIRECTORY_SYSTEM: 1
    • A.DIRECTORY_SYSTEM_SECURITY_: 1
    • A.DIRECTORY_SYSTEM_SECURITY_POLI: 1
    • A.DIRECTORY_SYSTEM_SECURITY_POLICY_: 1
    • A.INTEROP: 2
    • A.NO_EVIL: 2
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 3
    • A.REMOTE_ADMIN_DUA_: 1
    • A.REMOTE_ADMIN_DUA_ENVIRONMENT: 2
    • A.USERS: 2
  • D:
    • D.W: 2
  • O:
    • O.AUDIT: 6
    • O.MANAGE: 9
    • O.MEDIATE: 7
    • O.PARTIAL_SELF_: 1
    • O.PARTIAL_SELF_PROTECTION: 3
    • O.PARTIAL_TRUSTEDCOMM: 6
    • O.TOE_ACCESS: 4
  • OE:
    • OE.AUDIT_ACCESS: 7
    • OE.DISTRIBUTED_AUTHENTICA: 1
    • OE.DISTRIBUTED_AUTHENTICATION: 4
    • OE.PARTIAL_SELF_: 1
    • OE.PARTIAL_SELF_PROTECTION: 2
    • OE.PARTIAL_TRUSTEDCOMM: 7
    • OE.TIME: 6
  • T:
    • T.MASQUERADE: 4
    • T.TSF_COMPROMISE: 6
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.RCGATE: 13
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 8
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 5
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 71
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 34
    • TLS:
      • TLS: 1
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 2
pdf_data/st_metadata
  • /Author: krogers
  • /Company: CygnaCom Solutions, Inc.
  • /CreationDate: D:20070717085137-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070717085341-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070711135902
  • /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
  • pdf_file_size_bytes: 620673
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
  • /Author: z00se02158
  • /CreationDate: D:2015032309265509'00'
  • /Creator: PrimoPDF http://www.primopdf.com/
  • /ModDate: D:2015032309265509'00'
  • /Producer: PrimoPDF
  • /Title: Microsoft Word - MP_C2003_ST_EU_AA_1.00_jp_ENG.doc
  • pdf_file_size_bytes: 5626905
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different